A survey of MulVAL extensions and their attack scenarios coverage
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …
attacks on their networks. A popular method of visually representing cyber risks is the attack …
Review into state of the art of vulnerability assessment using artificial intelligence
S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
Securi cad by foreseeti: A cad tool for enterprise cyber security management
This paper presents a CAD tool for enterprise cyber security management called securi
CAD. It is a software developed during ten years of research at KTH Royal Institute of …
CAD. It is a software developed during ten years of research at KTH Royal Institute of …
A hybrid threat model for smart systems
F Valenza, E Karafili, RV Steiner… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cyber-physical systems and their smart components have a pervasive presence in all our
daily activities. Unfortunately, identifying the potential threats and issues in these systems …
daily activities. Unfortunately, identifying the potential threats and issues in these systems …
Evaluation of visual notations as a basis for ics security design decisions
For making informed security decisions during the design of industrial control systems (ICS),
engineers need to process large amounts of security-relevant information outside their area …
engineers need to process large amounts of security-relevant information outside their area …
[PDF][PDF] Quantitative security risk assessment for industrial control systems: Research opportunities and challenges
Due to the gradual implementation of the Industry 4.0 vision, information technology is
becoming increasingly important in industrial control systems (ICSs), such as production …
becoming increasingly important in industrial control systems (ICSs), such as production …
The impact of cyber security on business: how to protect your business
EM Kala - Open Journal of Safety Science and Technology, 2023 - scirp.org
This book presents knowledge and grasp of numerous sorts of computer attacks, as well as
the reasons and targets of those attacks. The introduction of the article includes a brief …
the reasons and targets of those attacks. The introduction of the article includes a brief …
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Water management infrastructures such as floodgates are critical and increasingly operated
by Industrial Control Systems (ICS). These systems are becoming more connected to the …
by Industrial Control Systems (ICS). These systems are becoming more connected to the …
Cyberattack graph modeling for visual analytics
Cybersecurity research demands continuous monitoring of the dynamic threat landscape to
detect novel attacks. Researchers and security professionals often deploy honeypot …
detect novel attacks. Researchers and security professionals often deploy honeypot …
A model based approach for SCADA safety and security joint modelling: S-Cube
S Kriaa, M Bouissou, Y Laarouchi - 2015 - IET
Modern control systems are becoming complex and interconnected as they are increasingly
integrating new information and communication technologies. Many industries like …
integrating new information and communication technologies. Many industries like …